Please enable JavaScript to use CodeHS

TN HS: CS.IC.1.b

CodeHS Lessons

Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users (Bots, Chatbots, Spiders or Crawlers, Web Scraping, keyloggers etc.).

Standard
7.7 Ethical Issues Around Data Collection
Standard
11.9 Cybersecurity
13.1 Getting Started with Data
Standard
11.9 Cybersecurity
13.1 Getting Started with Data
Standard
6.4 What is Web Optimization?
6.5 Optimizing Web Information
Standard
9.4 What is Web Optimization?
9.5 Optimizing Web Information
Standard
5.2 Malware Types and Prevention
Standard
15.1 Getting Started with Data
Standard
3.2 Big Data and Bias
Standard
2.2 Big Data and Bias
Standard
2.2 Big Data and Bias
Standard
5.13 Ethical Issues Around Data Collection
Standard
11.4 What is Web Optimization?
11.5 Optimizing Web Information
Standard
8.4 Malware Types and Prevention
Standard
11.9 Cybersecurity
13.1 Getting Started with Data
Standard
9.4 What is Web Optimization?
9.5 Optimizing Web Information
Standard
8.10 Cybersecurity
10.1 Getting Started with Data
Standard
8.10 Cybersecurity
10.1 Getting Started with Data
Standard
7.9 Cybersecurity
Standard
7.1 Getting Started with Data
Standard
8.2 Malware Types and Prevention
Standard
2.5 Cybersecurity
11.4 What is Web Optimization?
11.5 Optimizing Web Information
Standard
2.5 Cybersecurity
11.4 What is Web Optimization?
11.5 Optimizing Web Information
Standard
7.9 Cybersecurity
10.1 Getting Started with Data
Standard
1.6 Terms of Service and Privacy Policies
Standard
6.12 What is Web Optimization?
6.13 Optimizing Web Information
Standard
5.17 What is Web Optimization?
5.18 Optimizing Web Information
Standard
13.2 Malware Types and Prevention
Standard
5.6 Cybersecurity
14.7 Ethical Issues Around Data Collection
Standard
5.6 Cybersecurity
13.7 Ethical Issues Around Data Collection
Standard
1.5 Cybersecurity
3.7 What is Web Optimization?
Standard
5.4 What is Web Optimization?
5.5 Optimizing Web Information
Standard
1.5 Cybersecurity
3.7 What is Web Optimization?
10.4 What is Web Optimization?
10.5 Optimizing Web Information
Standard
7.13 Ethical Issues Around Data Collection
Standard
10.9 Cybersecurity
12.1 Getting Started with Data